At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Sequence tag directed subassembly of short sequencing reads into long
The invention provides methods for preparing DNA sequencing libraries by assembling short read sequencing data into longer contiguous sequences for genome...
Movement disorder monitoring and symptom quantification system and method
The present invention relates to a movement disorder monitor with high sensitivity, and a method of measuring the severity of a subject's movement disorder. The...
Method and apparatus for body balance and alignment correction and
This invention pertains generally to non-invasive methods and apparatus for analyzing and improving human balance. More particularly, this invention describes a...
Method and apparatus for quantitative assessment of neuromotor disorders
The present invention relates to methods and apparatus for quantitative assessment of neuromotor disorders using sensors and analyzing the data collected from...
Method for monitoring a person being examined
The invention relates to a method for monitoring recording of measurement data of a person being examined who is positioned on a couch in medical diagnostic...
Detection of vulnerabilities in computer systems
Systems, methods, and apparatus, including computer program products, for detecting a presence of at least one vulnerability in an application. The method is...
Risk model correcting system, risk model correcting method, and risk model
A risk value is calculated to suit a state and environment of an analysis target system, by presenting data for determining whether or not a calculated risk is...
Optimization of an application to reduce local memory usage
A method of optimizing an application to reduce local memory usage. The method can include instrumenting at least one executable class file of the application...
Cost analysis for selecting trace objectives
A tracing system may perform cost analysis to identify burdensome or costly trace objectives. For a burdensome objective, two or more objectives may be created...
Removal of asynchronous events in complex application performance analysis
A method and apparatus for identifying a minimum call tree data structure from a plurality of call tree data structures are provided. With the apparatus and...
Systems, methods, and algorithms for software source code analytics and
software metadata analysis
A system and method capable of summarizing data for all of a software company's engineers, repos (projects) and the entire organization so the executives and...
Software development for a hybrid computing environment
Software development for a hybrid computing environment that includes a host computer and an accelerator, the host computer and the accelerator adapted to one...
Data flow analyzer
A system and method for generating physical design of an integrated circuit, based on schematic design. The system includes graphical user interface and...
Profiling-based scan chain diagnosis
With various implementations of the invention, unloading masking information for each of the scan patterns is first determined. A tester then applies the scan...
Cryptographic system for performing secure iterative computations and
signal processing directly on encrypted...
Disclosed embodiments include a cryptographic system implemented in at least one digital computer with one or more processors or hardware such as FPGAs for...
Continuous user identification and situation analysis with identification
of anonymous users through...
This invention discloses a system for determining whether a purported or alleged authorized user is in fact the authorized user, by comparing new data on a...
Interestingness of data
Provided are techniques for analyzing fields. Statistical metrics for each field in a data set are received. A general interestingness index is generated for...
Data conversion device, data conversion method, and program
There is realized a data conversion device that performs generation of a hash value with improved analysis resistance and a high degree of safety. There are...
System and method for sentiment analysis
A system includes one or more computer processors that are configured to receive data relating to a composition of a target group, receive logged communications...
Trigger event detection apparatus and method therefor
A method of detecting a trigger event includes receiving an input signal for analysis. The received input signal is used to generate first data corresponding to...
Methods and systems for processing glucose data measured from a person
Methods and systems are disclosed for estimating a glucose level of a person having diabetes comprises. One method may comprise: receiving into a computing...
System and method for spatial point-of-interest generation and automated
trip segmentation using location data
This present invention is a spatial data processing system and method that allows the automatic, rapid, scalable analysis and transformation of large amounts of...
Vehicular diagnostic system
The present invention provides an onboard system for determining vehicle emissions. The emissions are determined in real-time and may be transmitted to a remote...
Centralized rescue network
A centralized rescue network system can receive an emergency alert message from a mobile device and use data from the message and from other sources to...
Methods and systems for solar shade analysis
A device for performing solar shade analysis combines a spherical reflective dome and a ball compass mounted on a platform, with a compass alignment mark and...
Data adapters for storage tape analytics system
A system for monitoring and analyzing operation of a tape infrastructure. The system includes a plurality of real and virtual tape libraries each including a...
Application-based profiles of printer driver settings
A method for managing printer driver settings using application-based profiles, comprising: applying the print settings for the application using...
HDMI image quality analysis
Systems and methods for evaluating video quality of HDMI data are provided. In one example an HDMI video quality evaluator controls a video device to render a...
Command input device, mobile information device, and command input method
Provided are a command input device, a mobile information device, and a command input method which can easily be operated by a user even when the input unit in...
Method and apparatus for handling 2-D fixes
The present invention provides a system for increasing the reliability of location data received from a container monitoring unit. According to a first...
Generating alerts for live performances
A live performance is monitored by analyzing an input data stream comprising real-time updates related to the live performance. Different sets of excitement...
Analyzing data from networked radar detectors
A radar detector accesses a network interface module that enables communication of data to and from a server. The server executes analysis algorithms that...
Method and device for measuring tactile profile of vagina
Transvaginal probes equipped with tactile sensors are configured for placement into vagina to record tactile response during insertion, acquire static tactile...
Apparatus and method for forecasting security threat level of network
Provided are an apparatus and method for forecasting the security threat level of a network. The apparatus includes: a security data collection unit for...
Multi-nodal malware analysis
A computer-implemented method includes accessing, by an analysis console, information related to a first file received at a first host of a plurality of hosts....
Efficiently solving the "use-def" problem involving label variables
A method for efficiently solving the "use-def" problem involving label variables performs a data-flow analysis on a control flow graph that includes calculating...
Code coverage-based taint perimeter detection
A code coverage-based taint perimeter detection system and method for testing software code by determining code coverage and detecting new coverage of the code....
Method for generating a transport track through a software system
landscape and computer system with a software...
A method for generating a transport track for routing transport requests through a software system landscape comprising a central control system and a plurality...
Reducing runtime and memory requirements of static timing analysis
Systems and methods for performing static timing analysis during IC design. A method is provided that includes obtaining canonical input data. The method...
Arranging data handling in a computer-implemented system in accordance
with reliability ratings based on...
Re-arranging data handling in a computer-implemented system that comprises a plurality of existing physical entities. At least one reliability rating is...
System and method for root cause analysis
Systems and methods for determining the root cause of an event in a data center are presented. The system includes a data center management device coupled to a...
Analysis of network traffic
Embodiments generally disclosed herein include a computer-implemented method for monitoring and correlating network traffic data associated with a primary...
Changing data received from the web using local data
There is provided a data processing system including a server device for providing Web data having a data portion with a specific identifier, and a data...
Techniques for application data scrubbing, reporting, and analysis
Techniques for application data scrubbing, reporting, and analysis are presented. A plurality of data sources are analyzed in accordance with their schemas and...
Automated screen scraping via grammar induction
A method and a computer-readable medium are provided which perform screen scraping via grammar induction. The computer-readable medium stores instructions of...
System and method for locking context of sets of members in crosstabs
A context locking method and system lock context of a set of members in a crosstab for further data exploration and analysis. The context locking system has a...
Efficient lexical trending topic detection over streams of data using a
modified sequitur algorithm
Embodiments are directed towards a Modified Sequitur algorithm (MSA) using pipelining and indexed arrays to identify trending topics within a plurality of...
Techniques for replicating changes to access control lists on
investigative analysis data
Techniques for replicating changes to access control lists on investigative analysis data are disclosed. After a change is made in a database to an access...
Compression threshold analysis of binary decision diagrams
In particular embodiments, a method includes receiving data sets, constructing a first binary decision diagram (BDD) representing the data sets, iteratively...
Graph-theoretic analysis of discrete-phase-space states for condition
change detection and quantification of...
Data collected from devices and human condition may be used to forewarn of critical events such as machine/structural failure or events from brain/heart wave...